Blog
Celebrating MOREnet 30 Years: The REAL Program
After a whirlwind first few years connecting higher education and starting to connect K-12 schools in phases, MOREnet began working with the Missouri State Library...
Safe Surfing
Everyone is cruising the Internet. Whether performing a search on the latest Hollywood gossip, shopping or using social media, we are all surfing. Whether using a...
Cryptocurrency
Cryptocurrency is digital money. This virtual currency is secured by cryptography, making it nearly impossible to counterfeit. In a recent conversation with my neighbor, she told...
Anything-as-a-Service
This term refers to a broad array of services that can be purchased by the customer. The phrase was defined when companies began serving up...
Double Extortion Attacks
A victim of ransomware will find all of their data encrypted. But to add insult to injury, the cyber crook will also collect the data...
Member Spotlight: Richard Altheide, Missouri Science and Technology
Richard Altheide is in telecommunications and network engineering at Missouri Science and Technology and was part of the planning process with MOREnet from the beginning....
Ransomware-as-a-Service (RaaS)
This business model has ransomware-as-a-service (RaaS) developers selling or leasing malware to affiliates on the dark web. RaaS providers make arrangements with cyber criminals to...
The Essential 18-CIS Critical Controls v8
Just released on May 18, is the eighth iteration of the Center of Internet Security Critical Controls. Previously, these 20 controls, based on best practices, aimed to...
Verizon 2021 Data Breach Investigation Report
Verizon's annual Data Breach Investigation Report (DBIR) is out! And, no surprise, the last year saw sharp spikes in pandemic themed phishing, collaboration platform abuse...
What is a Deepfake?
Deepfakes are this century's new approach to photo editing. Through the use of deep-learning artificial intelligence, computer imagery can be programmed to replace one person's...
Cybersecurity Threats and Attacks
There are inherent risks that accompany online activities. These threats can cause financial and reputation damage, disruption of business and legal issues. How can you...
Earthquakes and Customer Service: A reflection on the early days of networks and consulting at MOREnet
During the wild west days of cable pulling and plugging in old computers to utilize a free firewall, Patti Jones was a history and science...
Cyberbullying is Bullying
Bullying is bullying, whether in person or through the use of technology. Cyberbullying takes the act of bullying to higher levels. It used to be...
Defense in Cybersecurity
When operating a motor vehicle, it is important to learn the rules of the road. Becoming acquainted with your car's owners manual can help you...
Digital Spring Cleaning
Spring is in the air! Throw back the drapes, pull the blinds and open the windows. Let the sun shine in. Oh my, there are...
The Name Game
Acronym: a word (such as NATO, radar or laser) formed from the initial letter or letters of each of the successive parts or major parts...
Ransomware: Could You Be Next?
Ransomware is a form of malware. Its main purpose is to seize your systems, encrypt your data and basically make your network devices and data unusable....
Reminiscing With Ben Colley
In a newsletter earlier this year, we asked members to share with us some of their earliest memories of MOREnet. A couple different people mentioned...
Don't Get Fooled
April 1, April Fools' Day, is a day for jokes and tricks. Many of us have been on the receiving end of April Fools' pranks....
Reminiscing on 30 Years: A Videoconferencing Vision
The early years of the videoconferencing group at MOREnet have been likened to mission control for a space flight. All the parts had to move...